Secure and efficient data transmission by video steganography in medical imaging system

Article
  • 33 Downloads

Abstract

Normally, steganography is used to increase the security during data transmission. While medial data transfer from one hospital to another hospital, video steganography in medical imaging system increases the security level. Steganography system mainly focuses and verifies the information confidentiality, integrity and authenticity. Steganography algorithm in medical imaging system mainly focused on other than the doctor diagnosis area because diagnosis area must not be affected. Based on this, this paper presents video steganography in medical imaging system to provide confidentiality, authenticity and integrity during medical data transfer. Motion attention index value and variation range is calculated from selected frame in a video and human vision region of interest is chosen based on motion attention index value and variation range. With respect to human vision region of interest, foreground and background object is detected in a video. Then face detection algorithm is applied to detect moving object in a video. Secret information is hiding in background object and, other than the face area of the foreground object. The experimental analysis shows that increases embedding capacity rate and decreases the detectable distortion.

Keywords

Steganography Medical image Intensity inductor value Temporal coherence index value Variation range 

References

  1. 1.
    Malde, P.R., Admuthe, L.S.: Data hiding in motion vectors of video. Int. J. Adv. Res. Comput. Commun. Eng. 2(11), 4207–4209 (2013)Google Scholar
  2. 2.
    Paulpandi, P., Meyyappan, T.: Hiding messages using motion vector technique in video steganography. Int. J. Eng. Trends Technol. 3(3), 361–365 (2012)Google Scholar
  3. 3.
    Balu, S., Barjana, L.P., Kavitha, T., Nithya, K.: Video steganographic system for secure and efficient data transmission. Int. J. Adv. Innov. Res. 6(3), 159–162 (2017)Google Scholar
  4. 4.
    Balu, S., Amudha, K., Nelson Kennedy Babu, C.: Human visual sensitivity guided bit embedding for video steganography. J. Comput. Sci. 9, 928–934 (2013)CrossRefGoogle Scholar
  5. 5.
    Mostafa, S.A.K., Tolba, A.S., Abdelkader, F.M., Elhindy, H.M.: Video watermarking scheme based on principal component analysis and wavelet transform. Int. J. Comput. Sci. Netw. Secur. 9(8), 45–52 (2009)Google Scholar
  6. 6.
    Gupta, V., Sharma, D.: A study of various face detection methods. Int. J. Adv. Res. Comput. Commun. Eng. 3(5), 6694–6697 (2014)Google Scholar
  7. 7.
    Amudha, K., Nelson Kennedy Babu, C., Balu, S.: Hybrid baker map with AES in cipher block chaining mode in medical images. Int. Res. J. Pharm. 8(4), 67–73 (2016)Google Scholar
  8. 8.
    Amudha, K., Nelson Kennedy Babu, C., Balu, S.: Effectual reversible watermarking method for hide the patient details in brain tumor image. Int. J. Comput., Electr., Autom., Control Inf. Eng. 9(7), 1713–1717 (2016)Google Scholar
  9. 9.
    Kamal, Preet, Jindal, Gagandeep: Review of different steganographic techniques on medical images regarding their efficiency. Int. J. Innov. Eng. Technol. 2(2), 176–180 (2013)Google Scholar
  10. 10.
    Sumathi, C.P., Santanam, T., Umamaheswari, G.: A study of various steganographic techniques used for information hiding. Int. J. Comput. Sci. Eng. Surv. 4(6), 9–25 (2013)CrossRefGoogle Scholar
  11. 11.
    Santhi, B., Dheeptha, B.: A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design, pp. 1–16. Springer, Berlin (2016)Google Scholar
  12. 12.
    Pal, S., Bandyopadhyay, S.K.: A survey of analyzing data embedding technique in image staganography. Int. J. Latest Trends Eng. Technol. 7(2), 553–559 (2016)Google Scholar
  13. 13.
    Pandey, V., Shrivastava, M.: Medical image protection using steganography by crypto-image as cover image. Int. J. Adv. Comput. Res. 2(3), 45–48 (2012)Google Scholar
  14. 14.
    Razzaq, M.A., Baig, M.A., Shaikh, R.A., Memon, A.A.: Digital image security: fusion of encryption, steganography and watermarking. Int. J. Adv. Comput. Sci. Appl. 8(5), 224–228 (2017)Google Scholar
  15. 15.
    Atta, R., Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J. Vis. Commun. Image Represent. 53, 42–54 (2018)CrossRefGoogle Scholar
  16. 16.
    Wu, H.-T., Tanga, S., Huang, J., Shic, Y.-Q.: A novel reversible data hiding method with image contrast enhancement. Signal Process. Image Commun. 62, 64–73 (2018)CrossRefGoogle Scholar
  17. 17.
    Suresh, A., Varatharajan, R.: Competent resource provisioning and distribution techniques for cloud computing environment. Clust. Comput. (2017).  https://doi.org/10.1007/s10586-017-1293-6 Google Scholar
  18. 18.
    Chinnasamy, A., Sivakumar, B., Selvakumari, P., Suresh, A.: Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. Clust. Comput. (2018).  https://doi.org/10.1007/s10586-018-1760-8 Google Scholar
  19. 19.
    Kannan, N., Sivasubramanian, S., Kaliappan, M., Vimal, S., Suresh, A.: Predictive big data analytic on demonetization data using support vector machine. Comput, Clust (2018).  https://doi.org/10.1007/s10586-018-2384-8 Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringK.S. Rangasamy College of TechnologyNamakkalIndia
  2. 2.Department of Computer Science and EngineeringDhanalakshmi Srinivasan College of EngineeringCoimbatoreIndia
  3. 3.Department of Electronics and Communication EngineeringKongunadu College of Engineering and TechnologyTrichyIndia

Personalised recommendations